Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 08:30

General

  • Target

    dzperl58.exe

  • Size

    1.8MB

  • MD5

    a43c6aeb17611747c1b550f01f23b55a

  • SHA1

    2ae0fe09002101196feaff9ed11f364a02596406

  • SHA256

    ba64f9fa7624433ea60653c3641049fda289c891e969a23a0f03e1e7fea0fb01

  • SHA512

    0bfc6b30c1a6eb3f57107f956c26b0d95230db425af9aa6b0bf3665c32853812333a7d14c2c8acaa304c231008e755aae0feb683b49f625ae1808dc065de1c19

  • SSDEEP

    49152:iGnJhj1FVTNPwg5gBVxsrhMjOlohVQwULgLX+Nj:jlFF+4rhOjkwiAM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dzperl58.exe
    "C:\Users\Admin\AppData\Local\Temp\dzperl58.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Users\Admin\AppData\Local\Temp\is-KU70V.tmp\is-KOQHV.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-KU70V.tmp\is-KOQHV.tmp" /SL4 $400C4 "C:\Users\Admin\AppData\Local\Temp\dzperl58.exe" 1568416 58368
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-5D3T3.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-KU70V.tmp\is-KOQHV.tmp

    Filesize

    663KB

    MD5

    267548fab3a91835de6398fa26d2cb4f

    SHA1

    8b1b50d069fafea5a50a05054fa20f5ad4b0a066

    SHA256

    675a56ea0b5bf5e90cd4650dd7d25c5e8630a8d27cb641d7eaac8c1b809dc398

    SHA512

    17c1363412475774a053e0f2e93fda948038bda252bde1e428c327b7a31bb6f2c8be6cc3afd027eeda70944440ad52e899372b5f9838032b7d0db261fbbdcc65

  • memory/1788-3-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/1788-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1788-17-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2764-10-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2764-18-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB